Search results for query: lxc.mount.entry

  1. E

    Unable to initialize Google Coral USB Accelerator in LXC container (used to work)

    ...onboot: 0 ostype: debian rootfs: Datastore:vm-105-disk-0,size=20G swap: 2048 tags: 192.168.1.5 unprivileged: 1 lxc.cgroup2.devices.allow: c 189:* rwm lxc.mount.entry: /dev/bus/usb/003/011 dev/bus/usb/003/011 none bind,optional,create=dir
  2. K

    Unable to initialize Google Coral USB Accelerator in LXC container (used to work)

    ...device mapping and permissions in the lxc.conf? For instance, I have unprivileged: 1 lxc.cgroup2.devices.allow: c 189:* rwm lxc.mount.entry: /dev/bus/usb dev/bus/usb none bind,optional,create=dir Which is more permissive than I'd like, but it was a workaround to the device ID changing...
  3. P

    Festplatte (USB) plötzlich SEHR langsam

    ...local-lvm:vm-107-disk-0,size=16G swap: 512 tags: community-script;lxc;media unprivileged: 1 lxc.cgroup2.devices.allow: c 10:200 rwm lxc.mount.entry: /dev/net/tun dev/net/tun none bind,create=file Wegen fio fio --name=random-write --ioengine=posixaio --rw=randwrite --bs=4k --numjobs=1...
  4. T

    [TUTORIAL] Ubuntu LXC CT setup with device passthrough on Proxmox VE 8.4 for Frigate installation

    Permission 660 should also work, instead of 666. Glad it's working. Greetings!
  5. J

    [TUTORIAL] Ubuntu LXC CT setup with device passthrough on Proxmox VE 8.4 for Frigate installation

    ...root:apex /dev/apex_0 # Add the device to the LXC container with proper permissions # The 'dev' flag is crucial here! sed -i 's|lxc.mount.entry = /dev/apex_0 dev/apex_0 none bind,optional,create=file.*|lxc.mount.entry = /dev/apex_0 dev/apex_0 none bind,optional,create=file,dev 0, 0|g'...
  6. D

    [SOLVED] DHCP not working with SDN Subnet

    ...to this interface, root@goliath:~# pct config 101 | grep net net0: name=eth0,bridge=nexus,hwaddr=BC:24:11:A9:FD:BC,ip=dhcp,type=veth lxc.mount.entry: /dev/net/tun dev/net/tun none bind,create=file But, in the container, it is unable to get an IP address: root@cockpit:~# nmcli device...
  7. R

    [SOLVED] OpenVPN als Debian LXC-Container Listener ist nicht erreichbar.

    ...geöffnet Nano /etc/pve/lxc/101.config zwei Zeilen hinzugefügt lxc.cgroup2.devices.allow: c 10:200 rwm lxc.mount.entry: /dev/net dev/net none bind,create=dir chown 100000:100000 /dev/net/tun ausgeführt exit logout Dokumentation https://github.com/Nyr/openvpn-install geöffnet wget...
  8. W

    Sharing NAS in Jellyfin on Proxmox

    I actually figured out the solution to my issues soon after posting. Here's what I did: In the LCX: root@jellyfin:~# groupadd -g 10000 media root@jellyfin:~# usermod -aG media jellyfin root@jellyfin:~# mkdir -p /mnt/wickednas/movies/ root@jellyfin:~# mkdir -p /mnt/wickednas/audiobooks/...
  9. Impact

    Can't create a container template from a container with mount points

    The lxc.mount.entry documentation about this is a bit sparse but here. There's some more here and here. The mp documntation is here.
  10. D

    Can't create a container template from a container with mount points

    Well, I got it to work again. Based on another post, I removed the leading slashes from the container mount points. From lxc.mount.entry: /mnt/pve/Projects /mnt/projects none bind,rw 0 0 lxc.mount.entry: /mnt/pve/Projects/LinuxTools /mnt/linuxTools none bind,rw 0 0 To lxc.mount.entry...
  11. D

    Can't create a container template from a container with mount points

    Oops. I spoke too soon. Using lxc.mount.entry allowed me to convert the container to a template. Unfortunately, creating a new container from that template results in a container without the mount points. Drat. That's odd. The two lxc.mount.entry lines _are_ in the config file for the new...
  12. D

    Can't create a container template from a container with mount points

    I had to do a little research to find out what the lxc.mount.entry lines are. That works as workaround. I'll see if I can submit a bug report. Thanks very much
  13. Impact

    Can't create a container template from a container with mount points

    ...make it work is to use the same workaround people use to still be able to snapshot CTs with bind mounts For example you can replace mp0 and mp1 with this lxc.mount.entry: /mnt/pve/Projects /mnt/projects none bind,rw 0 0 lxc.mount.entry: /mnt/pve/Projects/LinuxTools /mnt/linuxTools none...
  14. B

    Just another GPU passthrough thread: iGPU for one LXC + dGPU for another (or split to even more)?

    ...swap: 4096 unprivileged: 1 lxc.cgroup2.devices.allow: c 226:0 rwm lxc.cgroup2.devices.allow: c 226:128 rwm lxc.mount.entry: /dev/dri/renderD128 dev/dri/renderD128 none bind,optional,create=file lxc.idmap: u 0 100000 65536 lxc.idmap: g 0 100000 44 lxc.idmap: g 44 44 1 lxc.idmap: g 45 100045 62...
  15. A

    Pass USB modem to LXC

    ...(Mass Storage Mode) root@pve:~# ls -l /dev/bus/usb/001/005 crw-rw-r-- 1 root root 189, 4 Jun 10 19:04 /dev/bus/usb/001/005 I add lxc.mount.entry: /dev/bus/usb/001/005 /dev/ttyUSB0 none bind,optional,create=file to /etc/pve/lxc/102.conf in result I get the following LXC lines there...
  16. A

    service 'ct:4090' in error state, must be disabled and fixed first - How do I disable LXCs in Proxmox?

    ...tags: gpu;ubuntu lxc.cgroup.devices.allow: c 195:* rwm lxc.cgroup.devices.allow: c 509:* rwm lxc.cgroup.devices.allow: c 226:* rwm lxc.mount.entry: /dev/nvidia0 dev/nvidia0 none bind,optional,create=file lxc.mount.entry: /dev/nvidiactl dev/nvidiactl none bind,optional,create=file...
  17. V

    [TUTORIAL] Tutorial: Unprivileged LXCs - Mount CIFS shares

    I noticed that LXC containers behave differently. And when I use 0 1 — which logically shouldn’t work — it actually does. The container takes a long time to start if the network share is unavailable. Inside the container, if the folder isn't accessible, it looks like this: /mnt/video_hdd# ls...
  18. Z

    Create a lxc accessible folder on the host

    ..."${dir}" # Mount shared directory in container; avoid "mpX: entries, as they prevent snapshots. # We create an entry of the form # lxc.mount.entry: /dir dir none rbind,optional,create=dir # Things are slightly more complicated, as we have to edit the configuration file # ourselves...
  19. V

    [TUTORIAL] Tutorial: Unprivileged LXCs - Mount CIFS shares

    Ok. With lxc.mount.entry: ..... ....... none rbind,optional,create=dir Everything works (unlike PCT SET). The only issue is the long startup time, but at least it's functional. What are the fundamental differences in this method? p.s. with none rbind,optional,create=dir 0 0 - automount not...